Compromised Data

Compromised Data
Author: Greg Elmer
Publisher: Bloomsbury Publishing USA
Total Pages: 297
Release: 2015-07-30
Genre: Social Science
ISBN: 1501306529

There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international lineup of contributors explores the limits and challenges of social data research in order to invent and develop new modes of doing public research. At its core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.

Compromised Data

Compromised Data
Author: Greg Elmer
Publisher: Bloomsbury Publishing USA
Total Pages: 297
Release: 2015-07-30
Genre: Social Science
ISBN: 1501306510

Explores the ethical and political issues surrounding big data, specifically obtained from social media.

Information is Beautiful

Information is Beautiful
Author: David McCandless
Publisher: HarperCollins UK
Total Pages: 258
Release: 2009
Genre: Art
ISBN: 0007294662

Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007

America, Compromised

America, Compromised
Author: Lawrence Lessig
Publisher: University of Chicago Press
Total Pages: 264
Release: 2018-10-22
Genre: Law
ISBN: 022631667X

An analysis of “the Trump era, but not about Trump. . . . but on how incentives across a range of institutions have created corruption” (New York Times Book Review). “There is not a single American awake to the world who is comfortable with the way things are.” So begins Lawrence Lessig's sweeping indictment of modern-day American institutions and the corruption that besets them—from the selling of Congress to special interests to the corporate capture of the academy. And it’s our fault. What Lessig brilliantly shows is that we can’t blame the problems of contemporary American life on bad people, as our discourse all too often tends to do. Rather, he explains, “We have allowed core institutions of America’s economic, social, and political life to become corrupted. Not by evil souls, but by good souls. Not through crime, but through compromise.” Through case studies of Congress, finance, the academy, the media, and the law, Lessig shows how institutions are drawn away from higher purposes and toward money, power, quick rewards—the first steps to corruption. Lessig knows that a charge so broad should not be levied lightly, and that our instinct will be to resist it. So he brings copious detail gleaned from years of research, building a case that is all but incontrovertible: America is on the wrong path. If we don’t acknowledge our own part in that, and act now to change it, we will hand our children a less perfect union than we were given. It will be a long struggle. This book represents the first steps. “A devastating argument that America is racing for the cliff's edge of structural, possibly irreversible tyranny.” —Cory Doctorow

Harboring Data

Harboring Data
Author: Andrea M. Matwyshyn
Publisher: Stanford University Press
Total Pages: 368
Release: 2009-10-06
Genre: Law
ISBN: 0804772592

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.

Data Breaches

Data Breaches
Author: Sherri Davidoff
Publisher: Addison-Wesley Professional
Total Pages: 552
Release: 2019-10-08
Genre: Business & Economics
ISBN: 013450772X

Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Managing Catastrophic Loss of Sensitive Data

Managing Catastrophic Loss of Sensitive Data
Author: Constantine Photopoulos
Publisher: Elsevier
Total Pages: 312
Release: 2011-04-18
Genre: Computers
ISBN: 0080558712

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. - Addresses a very topical subject of great concern to security, general IT and business management - Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data - Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues

Handbook of Data Intensive Computing

Handbook of Data Intensive Computing
Author: Borko Furht
Publisher: Springer Science & Business Media
Total Pages: 795
Release: 2011-12-09
Genre: Computers
ISBN: 1461414148

Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. Handbook of Data Intensive Computing is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book. Handbook of Data Intensive Computing is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.

Data Analytics and Management in Data Intensive Domains

Data Analytics and Management in Data Intensive Domains
Author: Alexei Pozanenko
Publisher: Springer Nature
Total Pages: 272
Release: 2022-07-25
Genre: Computers
ISBN: 3031122852

This book constitutes the post-conference proceedings of the 23rd International Conference on Data Analytics and Management in Data Intensive Domains, DAMDID/RCDL 2021, held in Moscow, Russia, in October 2021*. The 16 revised full papers were carefully reviewed and selected from 61 submissions. The papers are organized in the following topical sections: problem solving infrastructures, experiment organization, and machine learning applications; data analysis in astronomy; data analysis in material and earth sciences; information extraction from text * The conference was held virtually due to the COVID-19 pandemic.

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications
Author: Ric Messier
Publisher: Jones & Bartlett Learning
Total Pages: 562
Release: 2022-11-09
Genre: Computers
ISBN: 1284255859

"Incorporating real-world examples and exercises throughout, Security Strategies in Linux Platforms and Applications discusses every major aspect of security on a Linux system, including coverage of the latest Linux distributions and kernels. Written by industry experts, the text opens with a review of the risks, threats, and vulnerabilities associated with Linux as an operating system. Part 2 discusses how to take advantage of the layers of security available to Linux - user and group options, filesystems, and security options for important services. The text concludes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments"--